Cyber Security. What is cyber security? What are the risks? What can we do?

Size: px
Start display at page:

Download "Cyber Security. What is cyber security? What are the risks? What can we do?"

Transcription

1 Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity. What is cyber security? It seems that everything relies on computers and the internet now communication ( , cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of our daily life relies on computers? How much of our personal information is stored either on our own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks. What are the risks? There are many risks, some more serious than others. Among these dangers are viruses erasing our entire system, someone breaking into our system and altering files, someone using our computer to attack others, or someone stealing our credit card information and making unauthorized purchases. Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to us, but there are steps we can take to minimize the chances. What can we do? The first step in protecting ourself is to recognize the risks and become familiar with some of the terminology associated with them. Hacker, attacker, or intruder - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information). Malicious code - Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack our computer. Malicious code can have the following characteristics:

2 It might require to actually do something before it infects our computer. This action could be opening an attachment or going to a particular web page. Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via , websites, or network-based software. Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up our computer may actually be sending confidential information to a remote intruder. Viruses and worms are examples of malicious code. Vulnerability - In most cases, vulnerabilities are caused by programming errors in software. Attackers might be able to take advantage of these errors to infect our computer, so it is important to apply updates or patches that address known vulnerabilities. What are patches? Similar to the way fabric patches are used to repair holes in clothing, software patches repair holes in software programs. Patches are updates that fix a particular problem or vulnerability within a program. Sometimes, instead of just releasing a patch, vendors will release an upgraded version of their software, although they may refer to the upgrade as a patch. How do you find out what patches you need to install? When patches are available, vendors usually put them on their websites for users to download. It is important to install a patch as soon as possible to protect our computer from attackers who would take advantage of the vulnerability. Attackers may target vulnerabilities for months or even years after patches are available. Some software will automatically check for updates, and many vendors offer users the option to receive automatic notification of updates through a mailing list. If these automatic options are available. Make sure that we only download software or patches from websites that we trust. Do not trust a link in an .

3 Why is it important to remember that the internet is public? Because the internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It may seem less intimidating than actually interacting with other people because there is a sense of anonymity. However, we are not really anonymous when we are online, and it is just as easy for people to find information about us as it is for us to find information about them. Unfortunately, many people have become so familiar and comfortable with the internet that they may adopt practices that make them vulnerable. For example, although people are typically wary of sharing personal information with strangers they meet on the street, they may not hesitate to post that same information online. Once it is online, it can be accessed by a world of strangers, and we have no idea what they might do with that information. What guidelines can we follow when publishing information on the internet? View the internet as a novel, not a diary - Make sure we are comfortable with anyone seeing the information we put online. Expect that people we have never met will find our page; even if we are keeping an online journal or blog, write it with the expectation that it is available for public consumption. Some sites may use passwords or other security restrictions to protect the information, but these methods are not usually used for most websites. If we want the information to be private or restricted to a small, select group of people, the internet is probably not the best forum. Be careful what we advertise - In the past, it was difficult to find information about people other than their phone numbers or address. Now, an increasing amount of personal information is available online, especially because people are creating personal web pages with information about themselves. When deciding how much information to reveal, realize that we are broadcasting it to the world. Supplying our address may increase the amount of spam we receive. Providing details about our hobbies, our job, our family and friends, and our past may give attackers enough information to perform a successful social engineering. Realize that we can't take it back - Once we publish something online, it is available to other people and to search engines. we can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if we try to remove the page(s) from the internet, someone may have saved a copy of the page or used excerpts in another source. Some search engines "cache" copies of web pages; these cached copies may be available after a web page has been deleted or altered. Some web

4 browsers may also maintain a cache of the web pages a user has visited, so the original version may be stored in a temporary file on the user's computer. Think about these implications before publishing information once something is out there, we can't guarantee that we can completely remove it. As a general practice, let our common sense guide our decisions about what to post online. Before we publish something on the internet, determine what value it provides and consider the implications of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about us, the easier it is to pretend to be us. Behave online the way we would behave in our daily life, especially when it involves taking precautions to protect ourself. What is an ISP? An ISP, or internet service provider, is a company that provides its customers access to the internet and other web services. In addition to maintaining a direct line to the internet, the company usually maintains web servers. By supplying necessary software, a password-protected user account, and a way to connect to the internet (e.g., modem), ISPs offer their customers the capability to browse the web and exchange with other people. Some ISPs also offer additional services. With the development of smart phones, many cell phone providers are also ISPs. ISPs can vary in size some are operated by one individual, while others are large corporations. They may also vary in scope some only support users in a particular city, while others have regional or national capabilities. What services do ISPs provide? Almost all ISPs offer and web browsing capabilities. They also offer varying degrees of user support, usually in the form of an address or customer support hotline. Most ISPs also offer web hosting capabilities, allowing users to create and maintain personal web pages; and some may even offer the service of developing the pages for us. Some ISPs bundle internet service with other services, such as television and telephone service. Many ISPs offer a wireless modem as part of their service so that customers can use devices equipped with Wi-Fi. As part of normal operation, most ISPs perform backups of and web files. If the ability to recover and web files is important to us, check with our ISP to see if they back up the data; it might not be advertised as a service. Additionally, most ISPs implement firewalls to block some portion of incoming traffic, although we should consider this a supplement to our own security precautions, not a replacement. Understanding Firewalls

5 What do firewalls do? Firewalls provide protection against outside attackers by shielding our computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. What type of firewall is best? Firewalls are offered in two forms: hardware (external) and software (internal). While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type we use. Hardware - Typically called network firewalls, these external devices are positioned between our computer or network and our cable or DSL modem. Many vendors and some Internet service providers (ISPs) offer devices called "routers" that also include firewall features. Hardware-based firewalls are particularly useful for protecting multiple computers but also offer a high degree of protection for a single computer. If we only have one computer behind the firewall, or if we are certain that all of the other computers on the network are up to date on patches and are free from viruses, worms, or other malicious code, we may not need the extra protection of a software firewall. Hardware-based firewalls have the advantage of being separate devices running their own operating systems, so they provide an additional line of defense against attacks. Their major drawback is cost. Software - Some operating systems include a built-in firewall; if ours does, consider enabling it to add another layer of protection even if we have an external firewall. If we don't have a built-in firewall, we can obtain a software firewall for relatively little or no cost from our local computer store, software vendors, or ISP. Because of the risks associated with downloading software from the Internet onto an unprotected computer, it is best to install the firewall from a CD or DVD. If we do download software from the Internet, make sure it is a reputable, secure website. Although relying on a software firewall alone does provide some protection, realize that having the firewall on the same computer as the information we are trying to protect may hinder the firewall's ability to catch malicious traffic before it enters our system. How do we know what configuration settings to apply? Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptably secure for most users. Since each firewall is different, we will need to read and understand the documentation that comes with it to determine whether or not the default settings on our firewall are sufficient for

6 our needs. Additional assistance may be available from our firewall vendor or our ISP. Also, alerts about current viruses or worms Unfortunately, while properly configured firewalls may be effective at blocking some attacks, don't be lulled into a false sense of security. Although they do offer a certain amount of protection, firewalls do not guarantee that our computer will not be attacked. In particular, a firewall offers little to no protection against viruses that work by having we run the infected program on our computer, as many -borne viruses do. However, using a firewall in conjunction with other protective measures (such as antivirus software and "safe" computing practices) will strengthen our resistance to attacks. How do we choose an ISP? Traditional, broadband ISPs typically offer internet access through cable, DSL, or fiberoptic options. The availability of these options may depend where we live. In addition to the type of access, there are other factors that we may want to consider: security - Do we feel that the ISP is concerned about security? Does it use encryption and SSL to protect any information we submit (e.g., user name, password)? If the ISP provides a wireless modem, what wireless security standards does it support, and are those standards compatible with our existing devices? privacy - Does the ISP have a published privacy policy? Are we comfortable with who has access to our information and how it is being handled and used? services - Does our ISP offer the services we want? Do they meet our requirements? Is there adequate support for the services? If the ISP provides a wireless modem, are its wireless standards compatible with our existing devices? cost - Are the ISP's costs affordable? Are they reasonable for the number of services we receive, as well as the level of those services? Are we sacrificing quality and security to get the lowest price? reliability - Are the services our ISP provides reliable, or are they frequently unavailable due to maintenance, security problems, a high volume of users, or other reasons? If the ISP knows that services will be unavailable for a particular reason, does it adequately communicate that information? user support - Are there published methods for contacting customer support? Do we receive prompt and friendly service? Do their hours of availability accommodate our needs? Do the consultants have the appropriate level of knowledge? speed - How fast is our ISP's connection? Is it sufficient for accessing our or navigating the internet?

7 recommendations - Have we heard or seen positive reviews about the ISP? Were they from trusted sources? Does the ISP serve our geographic area? If we have uncovered negative points, are they factors we are concerned about?

8 General Security Choosing and Protecting Passwords Why do you need a password? Think about the number of personal identification numbers (PINs), passwords, or passphrases we use every day: getting money from the ATM or using our debit card in a store, logging on to our computer or , signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number, letter, and word combinations may be frustrating at times, and maybe we have wondered if all of the fuss is worth it. After all, what attacker cares about our personal account, right? Or why would someone bother with our practically empty bank account when there are others with much more money? Often, an attack is not specifically about our account but about using the access to our information to launch a larger attack. And while having someone gain access to our personal might not seem like much more than an inconvenience and threat to our privacy. One of the best ways to protect information or physical property is to ensure that only authorized people have access to it. Verifying that someone is the person they claim to be is the next step, and this authentication process is even more important, and more difficult, in the cyber world. Passwords are the most common means of authentication, but if we don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords. How do you choose a good password? Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them. Consider a four-digit PIN number is our a combination of the month, day, or year of our birthday? Or our address or phone number? Think about how easily it is to find this information out about somebody. What about our password is it a word that can be found in the dictionary? If so, it may be susceptible to "dictionary" attacks, which attempt to guess passwords based on words in the dictionary. Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, to help us remember how to decode it. For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Our best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to

9 "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters. Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when we can. For example, "This passwd is 4 my !" would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. We may need to try different variations of a passphrase many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics. Don't assume that now that we have developed a strong password we should use it for every system or program we log into. If an attacker does guess it, he would have access to all of our accounts. We should use these techniques to develop unique passwords for each of our accounts. Here is a review of tactics to use when choosing a password: Don't use passwords that are based on personal information that can be easily accessed or guessed. Don't use words that can be found in any dictionary of any language. Develop a mnemonic for remembering complex passwords. Use both lowercase and capital letters. Use a combination of letters, numbers, and special characters. Use passphrases when we can. Use different passwords on different systems. How can you protect we password? Now that we have chosen a password that's difficult to guess, we have to make sure not to leave it someplace for people to find. Writing it down and leaving it in our desk, next to our computer, or, worse, taped to our computer, is just making it easy for someone who has physical access to our office. Don't tell anyone our passwords, and watch for attackers trying to trick us through phone calls or messages requesting that we reveal our. If our internet service provider (ISP) offers choices of authentication systems, look for ones that use Kerberos, challenge/response, or public key encryption rather than simple passwords. Consider challenging service providers that only use passwords to adopt more secure methods. Also, many programs offer the option of "remembering" our password, but these programs have varying degrees of security protecting that information. Some programs, such as clients, store the information in clear text in a file on our computer. This means that anyone with access to our computer can discover all of our passwords and can gain access to our information. For this reason, always remember to log out when we are using a public computer (at the library, an internet cafe, or even a shared computer at our office). Other programs, such as Apple's Keychain and Palm's Secure

10 Desktop, use strong encryption to protect the information. These types of programs may be viable options for managing our passwords if we find we have too many to remember. There's no guarantee that these techniques will prevent an attacker from learning our password, but they will make it more difficult. Coordinating Virus and Spyware Defense Isn't it better to have more protection? Spyware and viruses can interfere with our computer's ability to process information or can modify or destroy data. We may feel that the more anti-virus and anti-spyware programs we install on your computer, the safer we will be. It is true that not all programs are equally effective, and they will not all detect the same malicious code. However, by installing multiple programs in an attempt to catch everything, we may introduce problems. How can anti-virus or anti-spyware software cause problems? It is important to use anti-virus and anti-spyware software. But too much or the wrong kind can affect the performance of our computer and the effectiveness of the software itself. Scanning our computer for viruses and spyware uses some of the available memory on our computer. If we have multiple programs trying to scan at the same time, we may limit the amount of resources left to perform our tasks. Essentially, we have created a denial of service against ourself. It is also possible that in the process of scanning for viruses and spyware, anti-virus or anti-spyware software may misinterpret the virus definitions of other programs. Instead of recognizing them as definitions, the software may interpret the definitions as actual malicious code. Not only could this result in false positives for the presence of viruses or spyware, but the anti-virus or anti-spyware software may actually quarantine or delete the other software. How can we avoid these problems? Investigate our options in advance - Research available anti-virus and antispyware software to determine the best choice for us. Consider the amount of malicious code the software recognizes, and try to find out how frequently the virus definitions are updated. Also check for known compatibility issues with other software we may be running on our computer. Limit the number of programs we install - Many vendors are now releasing packages that incorporate both anti-virus and anti-spyware capabilities together.

11 However, if we decide to choose separate programs, we really only need one antivirus program and one anti-spyware program. If we install more, we increase our risk for problems. Install the software in phases - Install the anti-virus software first and test it for a few days before installing anti-spyware software. If problems develop, we have a better chance at isolating the source and then determining if it is an issue with the software itself or with compatibility. Watch for problems - If our computer starts processing requests more slowly, we are seeing error messages when updating our virus definitions, our software does not seem to be recognizing malicious code, or other issues develop that cannot be easily explained, check our anti-virus and anti-spyware software. Debunking Some Common Myths How are these myths established? There is no one cause for these myths. They may have been formed because of a lack of information, an assumption, knowledge of a specific case that was then generalized, or some other source. As with any myth, they are passed from one individual to another, usually because they seem legitimate enough to be true. Why is it important to know the truth? While believing these myths may not present a direct threat, they may cause us to be more lax about our security habits. If we are not diligent about protecting ourself, we may be more likely to become a victim of an attack. What are some common myths, and what is the truth behind them? Myth: Anti-virus software and firewalls are 100% effective. Truth: Anti-virus software and firewalls are important elements to protecting our information. However, neither of these elements are guaranteed to protect us from an attack. Combining these technologies with good security habits is the best way to reduce our risk. Myth: Once software is installed on our computer, we do not have to worry about it anymore. Truth: Vendors may release updated versions of software to address problems or fix vulnerabilities. We should install the updates as soon as possible; some software even offers the option to obtain updates automatically. Making sure that we have the latest virus definitions for our anti-virus software is especially important. Myth: There is nothing important on our machine, so we do not need to protect it.

12 Truth: Our opinion about what is important may differ from an attacker's opinion. If we have personal or financial data on our computer, attackers may be able to collect it and use it for their own financial gain. Even if we do not store that kind of information on our computer, an attacker who can gain control of our computer may be able to use it in attacks against other people. Myth: Attackers only target people with money. Truth: Anyone can become a victim of identity theft. Attackers look for the biggest reward for the least amount of effort, so they typically target databases that store information about many people. If our information happens to be in the database, it could be collected and used for malicious purposes. It is important to pay attention to our credit information so that we can minimize any potential damage. Myth: When computers slow down, it means that they are old and should be replaced. Truth: It is possible that running newer or larger software programs on an older computer could lead to slow performance, but we may just need to replace or upgrade a particular component (memory, operating system, CD or DVD drive, etc.). Another possibility is that there are other processes or programs running in the background. If our computer has suddenly become slower, it may be compromised by malware or spyware, or we may be experiencing a denial-ofservice attack. Good Security Habits How can we minimize the access other people have to our information? We may be able to easily identify people who could, legitimately or not, gain physical access to our computer family members, roommates, co-workers, members of a cleaning crew, and maybe others. Identifying the people who could gain remote access to our computer becomes much more difficult. As long as we have a computer and connect it to a network, we are vulnerable to someone or something else accessing or corrupting our information; however, we can develop habits that make it more difficult. Lock our computer when we are away from it. Even if we only step away from our computer for a few minutes, it's enough time for someone else to destroy or corrupt our information. Locking our computer prevents another person from being able to simply sit down at our computer and access all of our information. Disconnect our computer from the Internet when we aren't using it. The development of technologies such as DSL and cable modems have made it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target our computer becomes much higher if our computer is always

13 connected. Depending on what method we use to connect to the Internet, disconnecting may mean disabling a wireless connection, turning off our computer or modem, or disconnecting cables. When we are connected, make sure that we have a firewall enabled. Evaluate our security settings. Most software, including browsers and programs, offers a variety of features that we can tailor to meet our needs and requirements. Enabling certain features to increase convenience or functionality may leave us more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet our needs without putting us at increased risk. If we install a patch or a new version of the software, or if we hear of something that might affect our settings, re-evaluate our settings to make sure they are still appropriate. What other steps can you take? Sometimes the threats to our information aren't from other people but from natural or technological causes. Although there is no way to control or prevent these problems, we can prepare for them and try to minimize the damage. Protect our computer against power surges and brief outages. Aside from providing outlets to plug in our computer and all of its peripherals, some power strips protect our computer against power surges. Many power strips now advertise compensation if they do not effectively protect our computer. Power strips alone will not protect us from power outages, but there are products that do offer an uninterruptible power supply when there are power surges or outages. During a lightning storm or construction work that increases the odds of power surges, consider shutting our computer down and unplugging it from all power sources. Back up all of our data. Whether or not we take steps to protect ourself, there will always be a possibility that something will happen to destroy our data. We have probably already experienced this at least once losing one or more files due to an accident, a virus or worm, a natural event, or a problem with our equipment. Regularly backing up our data on a CD or network reduces the stress and other negative consequences that result from losing important information. Determining how often to back up our data is a personal decision. If we are constantly adding or changing data, we may find weekly backups to be the best alternative; if our content rarely changes, we may decide that our backups do not need to be as frequent. We don't need to back up software that we own on CD- ROM or DVD-ROM we can reinstall the software from the original media if necessary.

14 Keeping Children Safe Online Cyber Security What unique risks are associated with children? When a child is using our computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. We need to consider these characteristics when determining how to protect our data and the child. We may think that because the child is only playing a game, or researching a term paper, or typing a homework assignment, he or she can't cause any harm. But what if, when saving her paper, the child deletes a necessary program file? Or what if she unintentionally visits a malicious web page that infects our computer with a virus? These are just two possible scenarios. Mistakes happen, but the child may not realize what she's done or may not tell us what happened because she's afraid of getting punished. Online predators present another significant threat, particularly to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick other users. Adults often fall victim to these ploys, and children, who are usually much more open and trusting, are even easier targets. Another growing problem is cyberbullying. These threats are even greater if a child has access to or instant messaging programs, visits chat rooms, and/or uses social networking sites. What can you do? Be involved - Consider activities we can work on together, whether it be playing a game, researching a topic we had been talking about (e.g., family vacation spots, a particular hobby, a historical figure), or putting together a family newsletter. This will allow us to supervise our child's online activities while teaching her good computer habits. Keep our computer in an open area - If our computer is in a high-traffic area, we will be able to easily monitor the computer activity. Not only does this accessibility deter a child from doing something she knows she's not allowed to do, it also gives us the opportunity to intervene if we notice a behavior that could have negative consequences. Set rules and warn about dangers - Make sure our child knows the boundaries of what she is allowed to do on the computer. These boundaries should be appropriate for the child's age, knowledge, and maturity, but they may include rules about how long she is allowed to be on the computer, what sites she is allowed to visit, what software programs she can use, and what tasks or activities she is allowed to do. We should also talk to children about the dangers of the internet so that they recognize suspicious behavior or activity. Discuss the risks of sharing certain types of information (e.g., that they're home alone) and the benefits to only communicating and sharing information with people they know.

15 Monitor computer activity - Be aware of what our child is doing on the computer, including which websites she is visiting. If she is using , instant messaging, or chat rooms, try to get a sense of who she is corresponding with and whether she actually knows them. Keep lines of communication open - Let our child know that she can approach us with any questions or concerns about behaviors or problems she may have encountered on the computer. Consider partitioning our computer into separate accounts - Most operating systems give us the option of creating a different user account for each user. If we are worried that our child may accidentally access, modify, and/or delete our files, we can give her a separate account and decrease the amount of access and number of privileges she has. If we don't have separate accounts, we need to be especially careful about our security settings. In addition to limiting functionality within our browser, avoid letting our browser remember passwords and other personal information. Also, it is always important to keep our virus definitions up to. Consider implementing parental controls - We may be able to set some parental controls within our browser. For example, Internet Explorer allows us to restrict or allow certain websites to be viewed on our computer, and we can protect these settings with a password. To find those options, click Tools on our menu bar, select Internet Options, choose the Content tab, and click the Enable... button under Content Advisor. There are other resources we can use to control and/or monitor our child's online activity. Some ISPs offer services designed to protect children online. Contact our ISP to see if any of these services are available. There are also special software programs we can install on our computer. Different programs offer different features and capabilities, so we can find one that best suits our needs. Real-World Warnings Keep us Safe Online Why are these warnings important? Like the real world, technology and the internet present dangers as well as benefits. Equipment fails, attackers may target us, and mistakes and poor judgment happen. Just as we take precautions to protect ourself in the real world, we need to take precautions to protect ourself online. For many users, computers and the internet are unfamiliar and intimidating, so it is appropriate to approach them the same way we urge children to approach the real world.

16 What are some warnings to remember? Don't trust candy from strangers - Finding something on the internet does not guarantee that it is true. Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable. It is also easy for attackers to "spoof" addresses, so verify that an is legitimate before opening an unexpected attachment or responding to a request for personal information. If it sounds too good to be true, it probably is - We have probably seen many s promising fantastic rewards or monetary gifts. However, regardless of what the claims, there are not any wealthy strangers desperate to send us money. Beware of grand promises they are most likely spam, hoaxes, or phishing schemes. Also be wary of pop-up windows and advertisements for free downloadable software they may be disguising spyware. Don't advertise that we are away from home - Some accounts, especially within an organization, offer a feature (called an autoresponder) that allows us to create an "away" message if we are going to be away from our for an extended period of time. The message is automatically sent to anyone who s us while the autoresponder is enabled. While this is a helpful feature for letting our contacts know that we will not be able to respond right away, be careful how we phrase our message. We do not want to let potential attackers know that we are not home, or, worse, givespecific details about our location and itinerary. Safer options include phrases such as "I will not have access to between [date] and [date]." If possible, also restrict the recipients of the message to people within our organization or in our address book. If our away message replies to spam, it only confirms that our account is active. This may increase the amount of spam we receive. Lock up our valuables - If an attacker is able to access our personal data, he or she may be able to compromise or steal the information. Take steps to protect this information by following good security practices. Some of the most basic precautions include locking our computer when we step away; using firewalls, antivirus software, and strong passwords; installing appropriate software updates; and taking precautions when browsing or using . Have a backup plan - Since our information could be lost or compromised (due to an equipment malfunction, an error, or an attack), make regular backups of our information so that we still have clean, complete copies. Backups also help us identify what has been changed or lost. If our computer has been infected, it is important to remove the infection before resuming our work. Keep in mind that if we did not realize that our computer was infected, our backups may also be compromised.

17 Safeguarding Our Data Why isn't "more" better? Maybe there is an extra software program included with a program we bought. Or perhaps we found a free download online. We may be tempted to install the programs just because we can, or because we think we might use them later. However, even if the source and the software are legitimate, there may be hidden risks. And if other people use our computer, there are additional risks. These risks become especially important if we use our computer to manage our personal finances (banking, taxes, online bill payment, etc.), store sensitive personal data, or perform work-related activities away from the office. However, there are steps we can take to protect ourself. How can we protect both our personal and work-related data? Use and maintain anti-virus software and a firewall - Protect ourself against viruses and Trojan horses that may steal or modify the data on our own computer and leave us vulnerable by using anti-virus software and a firewall. Make sure to keep our virus definitions up to date. Regularly scan our computer for spyware - Spyware or adware hidden in software programs may affect the performance of our computer and give attackers access to our data. Use a legitimate anti-spyware program to scan our computer and remove any of these files. Many anti-virus products have incorporated spyware detection. Keep software up to date - Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, we should turn it on. Evaluate our software's settings - The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access our computer. It is especially important to check the settings for software that connects to the internet (browsers, clients, etc.). Apply the highest level of security available that still gives us the functionality we need. Avoid unused software programs - Do not clutter our computer with unnecessary software programs. If we have programs on our computer that we do not use, consider uninstalling them. In addition to consuming system resources, these programs may contain vulnerabilities that, if not patched, may allow an attacker to access our computer. Consider creating separate user accounts - If there are other people using our computer, we may be worried that someone else may accidentally access, modify,

18 and/or delete our files. Most operating systems (including Windows XP and Vista, Mac OS X, and Linux) give us the option of creating a different user account for each user, and we can set the amount of access and privileges for each account. We may also choose to have separate accounts for our work and personal purposes. While this approach will not completely isolate each area, it does offer some additional protection. However, it will not protect our computer against vulnerabilities that give an attacker administrative privileges. Ideally, we will have separate computers for work and personal use; this will offer a different type of protection. Establish guidelines for computer use - If there are multiple people using our computer, especially children, make sure they understand how to use the computer and internet safely. Setting boundaries and guidelines will help to protect our data. Use passwords and encrypt sensitive files - Passwords and other security features add layers of protection if used appropriately. By encrypting files, we ensure that unauthorized people can't view data even if they can physically access it. We may also want to consider options for full disk encryption, which prevents a thief from even starting our laptop without a passphrase. When we use encryption, it is important to remember our passwords and passphrases; if we forget or lose them, we may lose our data. Follow corporate policies for handling and storing work-related information - If we use our computer for work-related purposes, make sure to follow any corporate policies for handling and storing the information. These policies were likely established to protect proprietary information and customer data, as well as to protect us and the company from liability. Even if it is not explicitly stated in our corporate policy, we should avoid allowing other people, including family members, to use a computer that contains corporate data. Dispose of sensitive information properly - Simply deleting a file does not completely erase it. To ensure that an attacker cannot access these files, make sure that we adequately erase sensitive files. Understanding Anti-Virus Software What does anti-virus software do? Although details may vary between packages, anti-virus software scans files or our computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that we have the latest definitions installed on our computer. Once we have installed an anti-virus package, we should scan our entire computer periodically.

19 Automatic scans - Depending what software we choose, we may be able to configure it to automatically scan specific files or directories and prompt us at set intervals to perform complete scans. Manual scans - It is also a good idea to manually scan files we receive from an outside source before opening them. This includes saving and scanning attachments or web downloads rather than selecting the option to open them directly from the source scanning media, including CDs and DVDs, for viruses before opening any of the files What happens if the software finds a virus? Each package has its own method of response when it locates a virus, and the response may differ according to whether the software locates the virus during an automatic or a manual scan. Sometimes the software will produce a dialog box alerting us that it has found a virus and asking whether we want it to "clean" the file (to remove the virus). In other cases, the software may attempt to remove the virus without asking us first. When we select an anti-virus package, familiarize ourself with its features so we know what to expect. Which software should we use? There are many vendors who produce anti-virus software, and deciding which one to choose can be confusing. All anti-virus software performs the same function, so our decision may be driven by recommendations, particular features, availability, or price. Installing any anti-virus software, regardless of which package we choose, increases our level of protection. Be careful, though, of messages claiming to include antivirus software. These messages, supposedly from our ISP's technical support department, contain an attachment that claims to be anti-virus software. However, the attachment itself is in fact a virus, so we could become infected by opening. How do we get the current virus information? This process may differ depending what product we choose, so find out what our antivirus software requires. Many anti-virus packages include an option to automatically receive updated virus definitions. Because new information is added frequently, it is a good idea to take advantage of this option. Resist believing chain letters that claim that a well-known anti-virus vendor has recently detected the "worst virus in history" that will destroy our computer's hard drive. These s are usually hoaxes. We can confirm virus information through our anti-virus vendor or through resources offered by other anti-virus vendors. While installing anti-virus software is one of the easiest and most effective ways to protect our computer, it has its limitations. Because it relies on signatures, anti-virus

20 software can only detect viruses that have signatures installed on our computer, so it is important to keep these signatures up to date. Attacks and Threats Recognizing Fake Antiviruses What is fake antivirus? Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security warnings to be displayed to the computer user. How can our computer become infected with fake antivirus? Criminals distribute this type of malware using search engines, s, social networking sites, internet advertisements and other malware. They leverage advanced social engineering methodologies and popular technologies to maximize number of infected computers. How will we know if we are infected? The presence of pop-ups displaying unusual security warnings and asking for credit card or personal information is the most obvious method of identifying a fake antivirus infection. What can we do to protect oueself? Be cautious when visiting web links or opening attachments from unknown senders. Keep software patched and updated. To purchase or renew software subscriptions, visit the vendor sites directly. Monitor our credit cards for unauthorized activity. To report Internet crime or fraud, contact the Internet Crime Complaint Center (

21 Avoiding the Pitfalls of Online Trading What is online trading? Online trading allows us to conduct investment transactions over the internet. The accessibility of the internet makes it possible for us to research and invest in opportunities from any location at any time. It also reduces the amount of resources (time, effort, and money) we have to devote to managing these accounts and transactions. What are the risks? Recognizing the importance of safeguarding our money, legitimate brokerages take steps to ensure that their transactions are secure. However, online brokerages and the investors who use them are appealing targets for attackers. The amount of financial information in a brokerage's database makes it valuable; this information can be traded or sold for personal profit. Also, because money is regularly transferred through these accounts, malicious activity may not be noticed immediately. To gain access to these databases, attackers may use Trojan horses or other types of malicious code. Attackers may also attempt to collect financial information by targeting the current or potential investors directly. These attempts may take the form of social engineering or phishing attacks. With methods that include setting up fraudulent investment opportunities or redirecting users to malicious sites that appear to be legitimate, attackers try to convince us to provide them with financial information that they can then use or sell. How can we protect ourself? Be wary of online information - Anyone can publish information on the internet, so try to verify any online research through other methods before investing any money. Also be cautious of "hot" investment opportunities advertised online or in . Check privacy policies - Before providing personal or financial information, check the website's privacy policy. Make sure we understand how our information will be stored and used. Conduct transactions on devices we control - Avoid conducting transactions on public resources such as internet kiosks, computers in places like libraries, and other shared computers and devices. Other users may introduce security risks. Make sure that our transactions are encrypted - When information is sent over the internet, attackers may be able to intercept it. Encryption prevents the attackers from being able to view the information.

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Paul Nguyen. 2014 CSG Interna0onal

Paul Nguyen. 2014 CSG Interna0onal Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College INFORMATION SECURITY BASICS A computer security tutorial for Holyoke Community College I NTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

The Care and Feeding of Your Computer Troubleshooting and Maintenance

The Care and Feeding of Your Computer Troubleshooting and Maintenance Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Deter, Detect, Defend

Deter, Detect, Defend Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff I N T R O D U C T I O N This tutorial provides some basic information and practical suggestions for protecting

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Seven Practices for Computer Security

Seven Practices for Computer Security A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Introduction to Cyber Security

Introduction to Cyber Security Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Introduction

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information